Information security , also known as Cyber Security is the detection and prevention of vulnerabilities and attacks that lead to theft of information or damages to hardware, software, or data of computer systems. The increase in the amount of new hardware and software that get released and their increasing number of users cause new vulnerabilities and attacks to be found every day. Due to its complexity, both in terms of politics and technology, it is also one of the major challenges of the contemporary world.

On top of cyber security, information security is also about the role of information and communications technologies in shedding light on issues such as vulnerability of children and adults to domestic violence, oppression, and/or exploitation.

 

Full Name Email Department Title Publishing Date
Carl Gunter cgunter@illinois.edu Computer Science NRF: A naive re-identification framework 2018-10-15
Masooda Bashir mnb@illinois.edu Information Sciences Privacy and security of cardiovascular implantable electronic devices: Applying a contextual integrity analysis 2018-1-1
William Sanders whs@illinois.edu Electrical and Computer Engineerin An Ontology Framework for Generating Discrete-Event Stochastic Models 2018-1-1
Zbigniew Kalbarczyk kalbarcz@illinois.edu Electrical and Computer Engineering Poster: Indirect cyber attacks by perturbation of environment control: A data driven attack model 2018-4-10
Yih-Chun Hu yihchun@illinois.edu Electrical and Computer Engineering BGP with BGPsec: Attacks and Countermeasures 2018-1-1
Nicol David dmnicol@illinois.edu Computer Science Security risk assessment for SDN-enabled smart grids 2019-1-1
Tao Xie taoxie@illinois.edu Computer Science Mining android app descriptions for permission requirements recommendation 2018-10-12
Tarek Abdelzaher zaher@illinois.edu Computer Science A Command-by-Intent Architecture for Battlefield Information Acquisition Systems 2018-9-5
Stephen Levinson selevins@illinois.edu Electrical and Computer Engineering Future direction 2014-1-1
Christopher Fletcher cwfletch@illinois.edu Computer Science Invisispec: Making speculative execution invisible in the cache hierarchy 2018-12-12

 

 

Full Name Email Department Title Publishing Date
Jian Huang jianh@illinois.edu Electrical and Computer Engineering FlashGuard: Leveraging intrinsic flash properties to defend against encryption ransomware 2017-10-30
Adam Bates batesa@illinois.edu Computer Science AliDrone: Enabling trustworthy proof-of-alibi for commercial drone compliance 2018-7-19
Robin Kravets rhk@illinois.edu Computer Science CryptoCop: Lightweight, energy-efficient encryption and privacy for wearable devices 2016-6-30
Deming Chen dchen@illinois.edu Electrical and Computer Engineering Acoustic landmarks contain more information about the phone string than other frames for automatic speech recognition with deep neural network acoustic model 2018-6-1
Miller Andrewn soc1024@illinois.edu Electrical and Computer Engineering Authenticated Data Structures for Privacy-Preserving Monero Light Clients 2018-7-6
Negar Kiyavash kiyavash@illinois.edu Electrical and Computer Engineering A covert queueing channel in fcfs schedulers 2018-6-1
Deming Chen dchen@illinois.edu Electrical and Computer Engineering Acoustic landmarks contain more information about the phone string than other frames for automatic speech recognition with deep neural network acoustic model 2018-6-1
Michael Bailey mdbailey@illinois.edu Electrical and Computer Engineering Measuring ethereum network peers 2018-10-31
Jose Meseguer meseguer@illinois.edu Computer Science Modular Verification of Sequential Composition for Private Channels in Maude-NPA 2018-1-1
Haitham Al-Hassanieh haitham@illinois.edu Electrical and Computer Engineering Enabling dense spatial reuse in mmWave networks 2018-8-7

 

 

Full Name Email Department Title Publishing Date
Vikram Adve vadve@illinois.edu Computer Science HPVM: Heterogeneous parallel virtual machine 2018-2-10
Kumar Rakesh rakeshk@illinois.edu Electrical and Computer Engineering Melody: Synthesized datasets for evaluating intrusion detection systems for the smart grid 2018-1-4
Darko Marinov marinov@illinois.edu Computer Science Trade-offs in continuous integration: Assurance, security, and flexibility 2017-8-21
Michael Shaw mjshaw@illinois.edu Business Administration The impact of business analytics strategy on social, mobile, and cloud computing adoption 2014-1-1
Kevin Chang kcchang@illinois.edu Computer Science Authenticity and credibility aware detection of adverse drug events from social media 2018-12-1
Klara Nahrstedt klara@illinois.edu Computer Science AliDrone: Enabling trustworthy proof-of-alibi for commercial drone compliance 2018-7-19
Romit Choudhuryt croy@illinois.edu Electrical and Computer Engineering Enabling dense spatial reuse in mmWave networks 2018-8-7
James Basney jbasney@illinois.edu National Center for Supercomputing Applications (NCSA) SciTokens: Capability-based secure access to remote scientific data 2018-7-22
Tamer Basar basar1@illinois.edu Electrical and Computer Engineering A bayesian multi-armed bandit approach for identifying human vulnerabilities 2018-1-1
Sibin Mohan sibin@illinois.edu Computer Science A design-space exploration for allocating security tasks in multicore real-Time systems 2018-4-19

 

 

Full Name Email Department Title Publishing Date
Cedric Langbort langbort@illinois.edu Aerospace Engineering Detection and mitigation of biasing attacks on distributed estimation networks 2019-1-1
Petros Voulgaris voulgari@illinois.edu Aerospace Engineering Security via multirate control in cyber–physical systems 2019-2-1
Nitin Vaidya nhv@illinois.edu Electrical and Computer Engineering Collaborative defense against data injection attack in IEC61850 based smart substations 2016-11-10
Yuguo Chen yuguo@illinois.edu Statistics Exponential random graph models for networks resilient to targeted attacks 2015-1-1
Jay Kesan kesan@illinois.edu Law Reducing Informational Disadvantages to Improve Cyber Risk Management 2018-4-1
Christoforos Hadjicostis chadjic@illinois.edu Electrical and Computer Engineering Detection of collaborative cyber-attacks through correlation and time dependency analysis 2016
Mahesh Viswanathan vmahesh@illinois.edu Computer Science Model checking indistinguishability of randomized security protocols 2018-1-1
Iyer Ravishankar rkiyer@illinois.edu Electrical and Computer Engineering Poster: Indirect cyber attacks by perturbation of environment control: A data driven attack model 2018-4-10